S. Akl and P. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, vol.1, issue.3, 1983.
DOI : 10.1145/357369.357372

S. Amer-yahia, S. Cho, L. Lakshmanan, and D. Srivastava, Minimization of tree pattern queries, ACM SIGMOD, 2001.

E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, Specifying and Enforcing Access Control Policies for XML Document Sources, WWW Journal, vol.3, issue.3, 2000.

E. Bertino, S. Castano, and E. Ferrari, Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, 2001.
DOI : 10.1109/4236.935172

L. Bouganim, F. Dang-ngoc, and P. Pucheral, Client-Based Access Control Management for XML Documents, INRIA internal report RR-582, 2004.

J. Birget, X. Zou, G. Noubir, and B. Ramamurthy, Hierarchy-based access control in distributed environments, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001.
DOI : 10.1109/ICC.2001.936308

S. Cho, S. Amer-yahia, L. Lakshmanan, and D. Srivastava, Optimizing the Secure Evaluation of Twig Queries, 2002.
DOI : 10.1016/B978-155860869-6/50050-0

C. Chan, P. Felber, M. Garofalakis, and R. Rastogi, Efficient filtering of XML documents with XPath expressions, The VLDB Journal The International Journal on Very Large Data Bases, vol.11, issue.4, 2002.
DOI : 10.1007/s00778-002-0077-6

R. Chandramouli, Application of XML tools for enterprise-wide RBAC implementation tasks, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000.
DOI : 10.1145/344287.344297

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002.
DOI : 10.1145/505586.505590

Y. Diao and M. Franklin, High-Performance XML Filtering: An Overview of YFilter, ICDE, 2003.

H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD, 2002.

J. Hopcroft and J. Ullman, Introduction to Automata Theory, Languages and Computation, 1979.

M. Kudo and S. Hada, XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352613

R. Merkle, A Certified Digital Signature Advances in Cryptology--Crypto'89, 1989.

G. Miklau and D. Suciu, Containment and equivalence for an XPath fragment, ACM PODS, 2002.

G. Micklau and D. Suciu, Controlling Access to Published Data Using Cryptography, 2003.
DOI : 10.1016/B978-012722442-8/50084-7

W. Ng, B. Ooi, K. Tan, and A. Zhou, PeerDB: a P2P-based system for distributed data sharing, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003.
DOI : 10.1109/ICDE.2003.1260827

F. Peng and S. Chawathe, PICS: Platform for Internet Content Selection, XPath Queries on Streaming Data, ACM SIGMOD, 2003.

I. Ray, I. Ray, and N. Narasimhamurthi, A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002.
DOI : 10.1145/507711.507723

B. Schneier, Applied Cryptography, 1996.

R. Vingralek, GnatDb, Secure Database System, VLDB, 2002.
DOI : 10.1016/B978-155860869-6/50087-1